On Wednesday, March 30, 2022 news of active exploitation of a previously unknown zero day Remote Code Execution vulnerability (CVE-2022-22965) in a component of java-based software, referred to as Spring4Shell, became widely known. The extent to which this software package is integrated into the world's technologies and platforms is still being discovered, making response a fluid activity for any security program.

At this time, Datto has not assessed any material exposure to the Spring4Shell vulnerability that would impact the safe use of Datto products. Should this assessment change, we will update Datto partners immediately.

We have completed an initial comprehensive assessment and response. The focus of those activities centered around the following:

  • Assessing usage within Datto products
  • Inspecting infrastructure systems in our asset inventories
  • Researching vulnerable third-party technologies
  • Inventorying Datto's third-party vendors to engage them and understand their response

While we consider our initial response complete, we remain in a state of active monitoring and readiness to respond. This situation is evolving and additional affected technologies could become known over the coming days and weeks ahead. All technology professionals will need to monitor for the latest developments and continually reassess their exposures.

Datto remains vigilant and will support our partners and the MSP community as the situation evolves.

Attachments

  • Original Link
  • Original Document
  • Permalink

Disclaimer

Datto Holding Corp. published this content on 31 March 2022 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 31 March 2022 23:04:54 UTC.